EP3257294B1 - Long term evolution (lte) communications over trusted hardware - Google Patents

Long term evolution (lte) communications over trusted hardware Download PDF

Info

Publication number
EP3257294B1
EP3257294B1 EP16707302.2A EP16707302A EP3257294B1 EP 3257294 B1 EP3257294 B1 EP 3257294B1 EP 16707302 A EP16707302 A EP 16707302A EP 3257294 B1 EP3257294 B1 EP 3257294B1
Authority
EP
European Patent Office
Prior art keywords
trusted
lte
message
apn
generate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
EP16707302.2A
Other languages
German (de)
French (fr)
Other versions
EP3257294A1 (en
Inventor
Lyle Walter Paczkowski
Arun Rajagopal
Ronald R. Marquardt
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sprint Communications Co LP
Original Assignee
Sprint Communications Co LP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sprint Communications Co LP filed Critical Sprint Communications Co LP
Publication of EP3257294A1 publication Critical patent/EP3257294A1/en
Application granted granted Critical
Publication of EP3257294B1 publication Critical patent/EP3257294B1/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0011Control or signalling for completing the hand-off for data sessions of end-to-end connection
    • H04W36/0022Control or signalling for completing the hand-off for data sessions of end-to-end connection for transferring data sessions between adjacent core network technologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0011Control or signalling for completing the hand-off for data sessions of end-to-end connection
    • H04W36/0033Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information
    • H04W36/0038Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information of security context information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/12Setup of transport tunnels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/71Hardware identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/16Gateway arrangements

Definitions

  • Data communication systems transfer data packets between user devices and machines to provide data communication services like internet access, media streaming, and user messaging.
  • Wireless communication systems allow users to move about and communicate over the air with access communication networks.
  • Wireless data networks provide mobile internet access, mobile media streaming, and mobile user messaging.
  • LTE Long Term Evolution
  • a wireless User Equipment detects an evolved-NodeB (eNodeB) base station and responsively exchanges Radio Resource Configuration (RRC) signaling with the eNodeB.
  • RRC Radio Resource Configuration
  • the eNodeB transfers an S1-Application Protocol (S1-AP) message to a Mobility Management Entity (MME), and the MME transfers a Diameter request message to a Home Subscriber System (HSS).
  • S1-AP S1-Application Protocol
  • MME Mobility Management Entity
  • HSS Home Subscriber System
  • IMSI International Mobile Subscriber Identifier
  • PLMN Public Land Mobile Network
  • RAT Radio Access Technology
  • the HSS processes the IMSI, PLMN, RAT type, and serving network to select an Access Point Name (APN).
  • the HSS transfers a Diameter response to the MME indicating the APN and associated APN information like a Packet Data Network Gateway (P-GW) Identifier (ID), Packet Data Network (PDN) type, default Quality-of-Service Class Identifier (QCI), and default Aggregate Maximum Bit Rate (AMBR).
  • P-GW Packet Data Network Gateway
  • ID Packet Data Network
  • PDN Packet Data Network
  • QCI Quality-of-Service Class Identifier
  • AMBR Aggregate Maximum Bit Rate
  • the MME processes the Diameter response message to generate an S11 General Packet Radio Service Transfer Protocol (GTP) message.
  • GTP General Packet Radio Service Transfer Protocol
  • the S11 GTP message indicates the APN and P-GW ID among other data.
  • the MME transfers the S11 GTP create session request to a Serving Gateway (S-GW).
  • S-GW processes the S11 GTP message to generate an S5 GTP message.
  • the S5 GTP message also includes the APN and P-GW ID.
  • the S-GW transfers the S5 GTP create session request to the P-GW.
  • the P-GW processes the APN and other data to identify an IP address for the UE.
  • the P-GW processes the S5 GTP message to transfer a Diameter request to a Policy Charging Rules Function (PCRF).
  • the Diameter request indicates the APN, default QCI, and default AMBR.
  • the PCRF applies QoS and accounting rules for the UE based various data inputs. For example, the PCRF may change a QCI or AMBR for a UE based on its APN, IMSI, and PLMN.
  • the PCRF transfers the Diameter response to the P-GW.
  • the P-GW processes the Diameter response to generate an S5 GTP response.
  • the S5 GTP response indicates the UE IP address and any new QCIs or AMBRs.
  • the P-GW transfers the S5 GTP response to the S-GW, and the S-GW transfers a corresponding S11 GTP response to the MME.
  • the MME processes the S11 GTP response to generate an S1-AP message that indicates the UE IP address, the GTP Tunnel Endpoint Identifiers (TEIDs) for the user and control planes, the QCI, AMBR, and the like.
  • the MME transfers the S1-AP message to the eNodeB.
  • the eNodeB processes the S1-AP message to transfer an RRC message to the UE that indicates the UE IP address, radio bearer, and Non-Access Stratum (NAS) information.
  • the UE, eNodeB, and MME exchange additional messaging to set context before the MME transfers S11 modify bearer signaling to the S-GW, and the S-GW transfers S5 modify bearer signaling to the P-GW.
  • the UE may then exchange user data over the eNodeB, S-GW, and P-GW.
  • Documents WO 2013/183971 and US 2010/235620 are relevant prior-art documents that teach the implementation of LTE data security features such as data encryption and integrity.
  • Hardware trust systems ensure network security and control.
  • the hardware trust systems maintain physical separation between trusted hardware and untrusted hardware.
  • the trust systems control software access to the trusted hardware but allow interaction between open and secure software components through secure bus interfaces, memories, time slices, and switching circuits.
  • the trust systems establish trust with one another by using secret keys embedded in their hardware to generate hash results for remote verification by other trust systems also knowing the secret keys and the hash algorithms. Unfortunately, the trust systems and the LTE systems are not effectively integrated.
  • a Long Term Evolution (LTE) communication network transfers data communications for User Equipment (UE).
  • An LTE gateway system exchanges hardware trust data with a server system to maintain hardware trust for the LTE gateway system.
  • An LTE access node processes a Radio Resource Control (RRC) message that contains a trusted bearer requirement for the UE to generate an S1 Application Protocol (S1-AP) initial UE message that contains the trusted bearer requirement for the UE.
  • An LTE management node processes the S1-AP initial UE message to generate a General Packet Radio Service Transfer Protocol (GTP) create session message that contains the trusted bearer requirement for the UE.
  • GTP General Packet Radio Service Transfer Protocol
  • the LTE gateway system exchanges user data for the UE between the LTE access node and a communication node responsive to the GTP create session message.
  • LTE communication system 100 to establish trusted bearers for User Equipment (UE) 101.
  • LTE communication system 100 comprises UE 101, LTE access node 110, LTE management node 111, LTE gateway systems 112-113, communication nodes 130-131, and server system 140.
  • UE 101 and LTE access node 110 communicate over Radio Resource Control (RRC) signaling link 122.
  • RRC Radio Resource Control
  • LTE access node 110 and LTE management node 111 communicate over S1-AP signaling link 123.
  • LTE management node 111 and LTE gateway systems 112-113 communicate over S11 General Packet Radio Service Transfer Protocol (GTP) signaling link 124.
  • GTP General Packet Radio Service Transfer Protocol
  • LTE access node 110 also communicate over LTE bearer 102.
  • LTE access node 110 and LTE gateway systems 112-113 communicate over respective LTE bearers 103-104.
  • LTE gateway systems 112-113 and communication nodes 130-131 communicate over respective data links 105-106.
  • Server system 140 and UE 101 communicate over trust signaling link 141.
  • Server system 140 and LTE access node 110 communicate over trust signaling link 142.
  • Server system 140 and LTE management node 111 communicate over trust signaling link 143.
  • Server system 140 and LTE gateway system 112 communicate over trust signaling link 144.
  • Server system 140 and communication node 103 communicate over trust signaling link 145.
  • Trust signaling links 141-145 may be transported by portions of signaling links 122-124 and bearers 102, 103, and 105. Note that server system 140 does not typically communicate with LTE gateway system 113 or with communication node 131.
  • UE 101 could be a phone, tablet computer, media device, or some other apparatus having a wireless LTE transceiver.
  • UE 101 includes processing circuitry and memory that store and execute various software modules.
  • UE 101 comprises communication transceivers, such as antennas, ports, bus interfaces, signal processors, memory, and software.
  • LTE access node 110 may be a wireless access node of various types such as an Enhanced Node B, picocell, femtocell, hotspot, repeater, and the like.
  • LTE access node 110 includes components like an antenna, amplifier, modulator, computer, and communication ports.
  • LTE access node 110 comprises processing circuitry and memory that store and execute various software modules, and LTE access node 110 may include virtual machines running on standard server systems.
  • LTE management node 111 may be a controller of various types like a Mobility Management Entity (MME), Home Subscriber System (HSS), and application server.
  • MME Mobility Management Entity
  • HSS Home Subscriber System
  • LTE management node 111 includes a computer, bus interface, and communication ports that have processing circuitry and memory to store and execute various software modules.
  • LTE management node 111 may comprise virtual machines running on standard server systems.
  • LTE gateway systems 112-113 may be packet gateways of various types like a Serving Gateway (S-GW), Packet Data Network Gateway (P-GW), High Speed Packet Access Gateway (HSPA-GW), High Rate Packet Data Gateway (HRPD-GW), Evolved Packet Data Gateway (ePDG), Multimedia Broadcast Multicast Service Gateway (M-GW), Broadcast Multicast Service Center (BM-SC), and/or some other type of data packet interface into an LTE system.
  • LTE gateway systems 112-113 typically include Policy Charging and Rules Functions (PCRFs) and On-line Charging Systems (OCSs) as well.
  • LTE gateway systems 112-113 include computers, bus interfaces, and communication ports that comprise processing circuitry and memory devices to store and execute various software modules.
  • LTE gateway systems 112-113 may comprise virtual machines running on standard server systems.
  • Server system 140 establishes and maintains hardware trust with the hardware in LTE gateway system 112, and typically with the other hardware systems in UE 101, access node 110, and communication node 130.
  • the hardware trust is first established within each hardware system that supports elements 101, 110, 112, and 130 by loading trust software modules to assert physical control over data access to hardware microprocessors, bus interfaces, memories, communication ports, and the like.
  • the trust software modules read secret keys physically embedded in the hardware and transfer encoded versions of the secret keys to server system 140 to maintain hardware trust. For example, server system 140 might repeatedly transfer random numbers to gateway system 112, and system 112 would then perform a one-way hash on the random numbers with its secret key and return the hash results to server system 140.
  • Server system 140 compares the received hash results to its own self-generated hash results to verify the hardware trust of gateway system 112.
  • Server system 140 includes a computer, bus interface, and communication ports that comprise processing circuitry and memory to store and execute various software modules. Server system 140 may include virtual machines running on standard server systems.
  • Communication nodes 130-131 comprise routers, switches, servers, databases, computers, user devices, or some other type of packet communication system.
  • RRC message 122 an RRC message on RRC signaling link 122.
  • LTE gateway system 112 exchanges hardware trust data 144 with server system 140 to maintain hardware trust for LTE gateway system 112.
  • Server system 140 may also exchange hardware trust data with UE 101, access node 110, and communication node 130, but server system 140 does not exchange hardware trust data with gateway system 113 or communication node 131.
  • UE 101 wirelessly synchronizes with LTE access node 110 during an initial RRC procedure over RRC link 122. UE 101 then transfers RRC message 122 to access node 110 that contains a trusted bearer requirement for UE 101.
  • the trusted bearer requirement means that UE 101 should only communicate over hardware systems that are trusted by server system 140.
  • the trusted bearer requirement may be indicated by an RRC Establishment Cause, Non-Access Stratum (NAS) information, or some other data field in RRC message 122.
  • NAS Non-Access Stratum
  • LTE access node 110 processes RRC message 122 that contains the trusted bearer requirement for UE 101 to generate S1-AP initial UE message 123 that contains the trusted bearer requirement for UE 101.
  • the trusted bearer requirement may be indicated by the Establishment Cause, NAS information, or some other data field in S1-AP message 123.
  • LTE access node 110 transfers S1-AP initial UE message 123 that contains the trusted bearer requirement to LTE management node 111.
  • LTE management node 111 processing S1-AP initial UE message 123 to generate S11 GTP create session message 124 that contains the trusted bearer requirement for UE 101.
  • the trusted bearer requirement may be indicated by Tunnel Endpoint Identifier (TEID) data, Access Point Name (APN) data, or some other data field in S11 GTP signaling 124.
  • TEID Tunnel Endpoint Identifier
  • API Access Point Name
  • LTE access node 110 wirelessly exchange user data over bearer 102.
  • LTE access node 110 and LTE gateway system 112 exchange the user data over bearer 103.
  • LTE gateway system 112 and communication node 130 exchange the user data over communication link 105 responsive to S11 GTP create session message 124.
  • an MME in LTE management node 111 processes S1-AP initial UE message 123 to generate a Diameter message that contains the trusted bearer requirement for UE 101.
  • An HSS in LTE management node 111 then processes the trusted bearer requirement in the Diameter message to generate a Diameter response that contains an Access Point Name (APN) for trusted LTE gateway system 112. If the trusted bearer requirement were not in the Diameter message, then the HSS could have selected a different APN for untrusted gateway system 113.
  • the MME processes the Diameter response with the APN for trusted LTE gateway system 112 to generate S11 GTP create session message 124. Specifically, the MME processes the APN to identify a P-GW in LTE gateway system 112.
  • an S-GW in LTE gateway system 112 processes S11 GTP create session message 124 having the trusted bearer requirement to generate an S5 GTP create session message that contains the trusted bearer requirement for UE 101.
  • a P-GW in LTE gateway system 112 then processes the S5 GTP create session message to generate a Diameter message that contains the trusted bearer requirement.
  • a PCRF in LTE gateway system 112 processes the Diameter message having the trusted bearer requirement for UE 101 to generate a Diameter response that contains additional requirements for the trusted bearer for UE 101.
  • the P-GW processes the Diameter response to implement the trusted bearer for UE 101.
  • LTE access node 110 exchanges hardware trust data with server system 140 to maintain hardware trust for a trusted hardware partition of LTE access node 110.
  • LTE access node 110 exchanges the user data between UE 101 and LTE gateway system 112 through the trusted hardware partition of LTE access node 110 responsive to the trusted bearer requirement for UE 101 in RRC signaling 122 and/or S1-AP signaling 123.
  • LTE gateway system 112 exchanges hardware trust data 124 with trusted server system 140 to maintain hardware trust for gateway system 112 (201).
  • LTE access node 110 processes RRC message 122 that contains a trusted bearer requirement for UE 101 to generate S1-AP initial UE message 123 that contains the trusted bearer requirement for UE 101 (202).
  • the trusted bearer requirement means that UE 101 should communicate over hardware systems that are trusted by server system 140.
  • LTE management node 111 processes S1-AP initial UE message 123 that contains the trusted bearer requirement for UE 101 to generate S11 GTP create session message 124 that contains the trusted bearer requirement for UE 101 (203).
  • LTE gateway system 112 exchanges user data for UE 101 between LTE access node 110 and communication node 130 responsive to S11 GTP create session message 124 (204). Note that additional LTE messaging takes place in a supporting and contemporaneous manner to that above in order to implement this LTE bearer, but this supporting signaling has been omitted from the discussion for clarity to teach innovative aspects.
  • LTE communication system 100 an exemplary configuration and operation for LTE communication system 100 is described, although system features may vary in other examples.
  • Various network elements are shown on Figure 3 with their home system indicated in parentheses.
  • an MME is shown with a parenthetical notation for LTE management node 111
  • a P-GW is shown with a parenthetical notation for LTE gateway system 112.
  • MME is referred as MME 111
  • P-GW is referred to as P-GW 112.
  • Trust server 140 exchanges hardware trust data with NodeB 110 to establish and maintain remote hardware trust for trusted NodeB 110.
  • Trust server 140 exchanges hardware trust data with S-GW 112 to establish and maintain remote hardware trust for trusted S-GW 112.
  • Trust server 140 exchanges hardware trust data with P-GW 112 to establish and maintain remote hardware trust for trusted P-GW 112.
  • trust server 140 may also exchange hardware trust data with UE 101 to establish and maintain hardware trust for UE 101.
  • the hardware trust verification for UE 101 may be periodic or be performed in response to UE rules in HSS 111 or in PCRF 112.
  • UE 101 transfers an RRC message to NodeB 110 that contains a trusted bearer requirement for UE 101.
  • the trusted bearer requirement means that UE 101 should only communicate over hardware systems that are trusted by trust server 140.
  • the trusted bearer requirement may be indicated by an RRC Establishment Cause, NAS information, or some data other field in the RRC signaling.
  • NodeB 110 processes the RRC message with the trusted bearer requirement to generate an S1-AP initial UE message that contains the trusted bearer requirement for UE 101.
  • NodeB 110 transfers the S1-AP initial UE message to MME 111.
  • MME 111 processes the S1-AP initial UE message to generate a Diameter message that contains the trusted bearer requirement for UE 101.
  • the MME transfers the Diameter message to HSS 111.
  • HSS 111 processes the trusted bearer requirement for UE 101 from the Diameter message to identify a trusted APN for trusted P-GW 112.
  • HSS 111 sends a Diameter response to MME 111 having the trusted APN.
  • MME 111 processes the Diameter response with the trusted APN for trusted P-GW 112 to generate an S11 GTP create session message.
  • MME 111 transfers the S11 GTP create session message with the trusted APN to trusted S-GW 112.
  • Trusted S-GW 112 processes the S11 GTP create session message having the trusted APN to generate an S5 GTP create session message that contains the trusted APN for UE 101.
  • S-GW 112 transfers the S5 GTP create session message to trusted P-GW 112.
  • Trusted P-GW 112 processes the S5 GTP create session message to generate a Diameter message that contains the trusted APN.
  • P-GW 112 transfers the Diameter message with the trusted APN to PCRF 112.
  • PCRF 112 processes the Diameter message having the trusted APN for UE 101 to identify a Quality-of-Service (QoS) Class Indicator for a trusted bearer for UE 101.
  • PCRF 112 transfers a Diameter response that contains the trust QCI - and possibly additional trust requirements for the trusted bearer.
  • PCRF 112 may process the APN and a UE ID to add a requirement that trust server 140 perform a hardware trust verification on UE 101 during the data session.
  • P-GW 112 processes the Diameter response to generate and transfer an S5 GTP create session response with the trust QCI to S-GW 112.
  • S-GW 112 processes the S5 GTP create session response to generate and transfer an S11 GTP create session response with the trust QCI to MME 111.
  • MME 111 processes the S11 GTP create session response to generate and transfer an S1-AP initial context set-up request with the trust QCI to NodeB 110.
  • NodeB 110 processes the S1-AP initial context set-up request to generate and transfer an RRC connection reconfiguration message with the trust QCI to UE 101.
  • UE 101 and trusted NodeB 110 wirelessly exchange user data over trusted bearer 102 based on the trust QCI.
  • Trusted NodeB 110 and trusted S-GW 112 exchange the user data over trusted bearer 103 based on the trust QCI.
  • Trusted S-GW 112 and trusted P-GW 112 exchange the user data over a trusted bearer based on the trust QCI.
  • Trusted P-GW 112 exchanges the user data with communication node 130 over trusted data link 105 based on the trust QCI.
  • FIG. 4 illustrates LTE communication network 400 to establish a trusted bearer for UE 401.
  • LTE communication network 400 is an example of communication system 100, although system 100 may use alternative configurations and operations.
  • LTE communication network 400 comprises UE 401, eNodeB 410, S-GW 411, P-GW 412, communication node 413, MME 415, HSS 416, PCRF 417, S-GW 421, P-GW 422, communication node 423, S-GW 431, P-GW 432, communication node 433, and trust server 440.
  • Trust server 440 establishes and maintains hardware trust with UE 401, eNodeB 410, S-GW 411, P-GW 412, and communications node 413.
  • the hardware trust is first established within each hardware system that operates network elements 401, 410, 411, 412, 413, 440 by loading trust software modules to assert physical control over data access to hardware microprocessors, bus interfaces, memories, communication ports, and the like.
  • the trust software modules read secret keys physically embedded in the hardware and transfer encoded versions of the secret keys to maintain hardware trust.
  • trust server 440 repeatedly transfers random numbers to UE 401, eNodeB 410, S-GW 411, P-GW 412, and communications node 413, and these systems hash the random numbers with their secret keys to return hash results to trust server 440.
  • Trust server 440 then compares the received hash results to self-generated hash results to establish or verify the hardware trust.
  • UE 401 detects eNodeB 410 and responsively exchanges LTE RRC signaling with eNodeB 410.
  • the RRC signaling exchange includes a trusted bearer requirement from UE 401.
  • the trusted bearer requirement may be triggered in UE 401 by a mode switch, application, location, time, and the like.
  • the trusted bearer requirement may be included in the Establishment Cause, NAS information, and/or some other portion of the RRC signaling. If the RRC signaling indicates a trusted bearer requirement for UE 401, then eNodeB 410 allocates trusted hardware to exchange resource blocks with UE 401. In some cases, only trusted hardware is available in eNodeB 410.
  • eNodeB 410 transfers an S1-AP message to MME 415 that indicates the trusted bearer requirement for UE 401 in response to the trusted bearer requirement in the RRC signaling.
  • MME 415 transfers a Diameter request message to HSS 416 that indicates the trusted bearer requirement for UE 401 responsive to the trusted bearer requirement in the S1-AP message.
  • HSS 416 processes the Diameter request message to generate a Diameter response message.
  • HSS 416 processes the trusted bearer requirement to select a trusted APN that uses trusted hardware.
  • HSS 416 also processes the IMSI, PLMN, RAT type, and serving network to further refine the trusted APN selection.
  • HSS 416 selects an APN that uses trusted gateways 411-412 and communication node 413 in response to the trusted bearer requirement. HSS 416 transfers the Diameter response message to MME 415.
  • the Diameter response message indicates the trusted APN and associated APN information like a trusted P-GW ID, PDN type, default QCI, and default AMBR data.
  • MME 415 processes the Diameter response message to generate an S11 GTP message.
  • the S11 GTP message indicates the trusted APN and trusted P-GW ID among other data.
  • MME 415 transfers the S11 GTP create session request to S-GW 411.
  • S-GW 411 processes the S11 GTP message to generate an S5 GTP message.
  • the S5 GTP message also includes trusted APN and trusted P-GW ID.
  • S-GW 411 transfers the S5 GTP create session request to P-GW 412.
  • P-GW 412 processes the trusted APN and other data to identify an IP address for UE 401.
  • P-GW 412 processes the S5 GTP message to transfer a Diameter request to PCRF 417.
  • the Diameter request indicates the trusted APN, default QCI, and default AMBR.
  • PCRF 417 processes the Diameter request to generate a Diameter response.
  • PCRF 417 applies QoS and accounting rules for UE 401 based various data inputs including the trusted bearer requirement.
  • PCRF 417 may process the trusted APN and serving network ID to select a new QCI for the trusted bearer for UE 401.
  • PCRF 417 may also apply trust policies, such as on-demand UE and/or gateway hardware verification and the like.
  • PCRF 417 transfers the Diameter response to P-GW 412.
  • P-GW 412 processes the Diameter response to generate an S5 GTP response.
  • the S5 GTP response indicates the UE IP address and any new QCIs, AMBRs, and trust requirements.
  • P-GW 412 transfers the S5 GTP response to S-GW 411.
  • S-GW 411 processes the S5 GTP response to generate an S11 GTP response.
  • the S11 GTP response indicates the UE IP address and any new QCIs, AMBRs, and trust requirements.
  • S-GW 411 transfers the S11 GTP response to MME 415.
  • MME 415 processes the S11 GTP response to generate an S1-AP message.
  • the S1-AP message indicates the UE IP address, the GTP TEIDs for the user and control planes, the QCI, AMBR, and the like.
  • MME 415 transfers the S1-AP message to eNodeB 410.
  • eNodeB 410 processes the S1-AP message to generate an RRC message that indicates the UE IP address, radio bearer, and NAS information.
  • eNodeB 410 transfers the RRC message to UE 401.
  • UE 401, eNodeB 410, and MME 415 exchange additional messaging to set context before MME 415 transfers S11 modify bearer signaling to S-GW 411, and S-GW 411 transfers S5 modify bearer signaling to P-GW 412.
  • UE 401 and communication node 413 then exchange user data over eNodeB 410, S-GW 411, and P-GW 412 - all using trusted hardware.
  • Trust server 440 does not establish hardware trust with S-GW 421, P-GW 422, and communications node 423.
  • UE 401 detects eNodeB 410 and responsively exchanges LTE RRC signaling with eNodeB 410. This RRC signaling exchange does not include the trusted bearer requirement for UE 401. The lack of the trusted bearer requirement may be due to a mode switch, location, application, time, or the like. If the RRC signaling does not indicate the trusted bearer requirement, then eNodeB 410 does not need to allocate trusted hardware for UE 401, although only trusted hardware may be available. In addition, the resulting S1-AP message to MME 415 does not include the trusted bearer requirement, so a trusted APN is not required. Thus, HSS 416 may select an APN that uses untrusted hardware in S-GW 421, P-GW 422, and communications node 423.
  • FIG. 5 illustrates LTE communication network 500 to establish a trusted bearer for UE 501.
  • LTE communication network 500 is an example of communication system 100 and network 400, although system 100 and network 400 may use alternative configurations and operations.
  • LTE communication network 500 comprises UE 501, femtocell 510, data centers 1-N, and communication nodes 1-N.
  • Data centers 1-N each host various virtual machine network elements including S-GW, P-GW, MME, HSS, PCRF, and the like.
  • Data centers 1 and N include trust systems to verify hardware trust. Data center 2 does not have a trust system. The trust systems maintain hardware trust at data centers 1 and N through the exchange of challenge data using shared secret keys.
  • UE 501 detects femtocell 510 and responsively exchanges LTE RRC signaling with femtocell 510.
  • the RRC signaling exchange includes a trusted bearer requirement from UE 501.
  • the trusted bearer requirement may be triggered in UE 501 by a mode switch, application, location, time, and the like.
  • the trusted bearer requirement may be included in the Establishment Cause, NAS information, and/or some other portion of the RRC signaling. If the RRC signaling indicates a trusted bearer requirement for UE 501, then femtocell 510 allocates trusted hardware to exchange the resource blocks with UE 501, although only trusted hardware may be available in femtocell 510.
  • Femtocell 510 transfers an S1-AP message to an MME in data center #1 that indicates the trusted bearer requirement for UE 501 in response to the trusted bearer requirement in the RRC signaling.
  • the MME transfers a Diameter request to the HSS.
  • the HSS selects a trusted APN that uses trusted hardware responsive to the trusted bearer requirement.
  • the HSS selects an APN that uses trusted data center #1 and trusted communication node #1.
  • the HSS transfers a Diameter response to the MME.
  • the Diameter response indicates the trusted APN and associated APN information like a trusted P-GW ID, PDN type, default QCI, and default AMBR data.
  • the MME generates an S11 GTP message that indicates the trusted APN and trusted P-GW ID among other data.
  • the MME transfers the S11 GTP create session request to the S-GW, and the S-GW transfers a corresponding S5 GTP message to the P-GW.
  • the P-GW identifies an IP address for UE 501.
  • the P-GW processes transfers a Diameter request to the PCRF indicating the trusted APN, trusted P-GW ID, default QCI, and default AMBR.
  • the PCRF applies QoS and accounting rules for UE 501 based the trusted bearer requirement. For example, the PCRF may process the trusted APN to select a new AMBR for the trusted bearer.
  • the PCRF may also apply trust policies, such as on-demand hardware verification for UE 501 and communication node #1.
  • the PCRF transfers a Diameter response to the P-GW.
  • the P-GW generates an S5 GTP response that indicates the UE IP address and any new QCIs, AMBRs, and trust requirements.
  • the P-GW transfers the S5 GTP response to the S-GW, and the S-GW transfers a corresponding S11 GTP response to the MME.
  • the MME transfers an S1-AP message to femtocell 510 that indicates the GTP TEID, QCI, AMBR, and the like.
  • Femtocell 510 transfers an RRC message to UE 501 that indicates the UE IP, radio bearer, and NAS information.
  • UE 501 and communication node #1 then exchange user data over femtocell 510 and data center #1 using trusted hardware.
  • UE 501 detects femtocell 510 and responsively exchanges LTE RRC signaling with eNodeB 410.
  • the RRC signaling does not include the trusted bearer requirement for UE 501.
  • Femtocell 510 need not use trusted hardware for UE 501, although only trusted hardware may be available.
  • the resulting S1-AP message to the MME does not include the trusted bearer requirement, so a trusted APN is not required.
  • Femtocell 510 may use the MME in Data Center #2.
  • the HSS may select an APN that uses untrusted hardware in data center #2.
  • UE 501 and communication node #2 would then exchange user data over data center #2 using untrusted hardware.
  • LTE signaling 600 to establish trusted bearers for a UE.
  • LTE signaling 600 is an example of the signaling used by system 100 and networks 400 and 500, although they may use alternative configurations and operations. Note that some signaling data and supporting signaling messages are omitted from the following discussion for clarity to teach innovative aspects.
  • an LTE UE detects wireless signaling from an eNodeB and begins an LTE RRC data exchange with the eNodeB. These initial random access RRC messages that set timing and establish a UE ID are not shown.
  • the UE transfers an RRC connection request message to the eNodeB.
  • the RRC connection request message includes UE Identifiers (IDs) like the Radio Network Temporary Identifier (RNTI) and International Mobile Subscriber Entity (IMSI).
  • the RRC connection request message includes an Establishment Cause like Mobile-Originated Signaling (MO-SIG) or Mobile-Originated Data (MO-DATA).
  • the RRC connection request message also includes a trusted bearer requirement for the UE. In some examples, the trusted bearer requirement is indicated by the Establishment Cause itself. In other examples, the trusted bearer requirement is transferred in other RRC signaling and is not provided in the RRC connection request message.
  • the eNodeB processes the Establishment Cause in the RRC connection set-up message to select resource blocks for the UE. If the Establishment Cause indicates the trusted bearer requirement for the UE, then the eNodeB allocates trusted hardware to exchange the resource blocks with the UE. Although not shown for clarity, the eNodeB returns an RRC connection set-up message with the pertinent LTE resource block information.
  • the UE transfers an RRC connection set-up complete message to the eNodeB.
  • the RRC connection set-up complete message includes UE IDs like the IMSI.
  • the RRC connection set-up complete message includes a Public Land Mobile Network (PLMN) ID, MME ID, and NAS information.
  • PLMN Public Land Mobile Network
  • the RRC connection set-up complete message also includes the trusted bearer requirement for the UE. In some examples, the trusted bearer requirement is indicated by the NAS information. In other examples, the trusted bearer requirement is transferred in other RRC signaling and is not provided in the RRC connection set-up complete message.
  • the eNodeB processes the RRC connection set-up complete message to generate an S1-AP message.
  • the S1-AP message includes an eNodeB/UE ID and IMSI.
  • the S1-AP message indicates an Evolved Packet System (EPS)/IMSI attachment for an initial connection.
  • the S1-AP message includes User Location Information (ULI) like tracking area, cell ID, sector ID, and the like.
  • the S1-AP message includes the PLMN and NAS info.
  • the S1-AP message includes the trusted bearer requirement for the UE - possibly in the NAS information.
  • the trusted bearer requirement for the UE in the S1-AP message is included in response to the trusted bearer requirement in the RRC messaging.
  • the eNodeB transfers the S1-AP message to the MME.
  • the eNodeB is able to implement trusted hardware for a UE on an individual attachment basis.
  • the MME transfers a Diameter Update Location Request message to the HSS.
  • the Diameter Update Location Request message indicates host/realm for the origin and destination.
  • the Diameter Update Location Request message indicates the IMSI, ULI, PLMN, RAT type, and the serving network.
  • the Diameter Update Location Request message indicates the trusted bearer requirement for the UE responsive to the trusted bearer requirement in the S1-AP message.
  • the HSS processes the Diameter Update Location Request message to generate a Diameter Update Location Response message.
  • the HSS processes the trusted bearer requirement from the request to select a trusted APN that uses trusted hardware systems.
  • the IMSI, PLMN, RAT type, and the serving network are used to further refine trusted APN selection. For example, different combinations of IMSIs, PLMNs, and serving networks may yield different trusted APNs.
  • the HSS is able to select trusted APNs and hardware for the UE on an individual attachment basis.
  • the HSS transfers the Diameter Update Location Response message to the MME.
  • the Diameter Update Location Response message indicates that network access is granted to the UE.
  • the Diameter Update Location Response message indicates the trusted APN and associated APN information like a trusted P-GW ID, trusted PDN ID, PDN type, QCI, AMBR data, and the trusted bearer requirement.
  • the trusted bearer requirement may be indicated through the trusted APN, P-GW ID, and PDN ID.
  • the MME processes the Diameter Update Location Response message to generate an S11 GTP create session request.
  • the S11 GTP create session request includes an Evolved Packet System (EPS) bearer ID and a GTP TEID for the MME control plane (MME TEID-C).
  • EPS Evolved Packet System
  • MME TEID-C GTP TEID for the MME control plane
  • the S11 GTP create session request identifies the IMSI, ULI, serving network, RAT type, trusted APN, trusted P-GW ID, trusted PDN ID, PDN type, QCI, and AMBR.
  • the S11 GTP create session request also includes the trusted bearer requirement, although this requirement may be indicated through the trusted APN, P-GW ID, and PDN ID.
  • the MME transfers the S11 GTP create session request to the S-GW.
  • the S-GW processes the S11 GTP create session request to generate an S5 GTP create session request.
  • the S5 GTP create session request includes the EPS bearer ID and GTP TEIDs for the S-GW control and user planes (S-GW TEID-C and S-GW TEID-U).
  • the S5 GTP create session request identifies the IMSI, ULI, serving network, RAT type, trusted APN, trusted P-GW ID, trusted PDN ID, PDN type, QCI, and AMBR.
  • the S5 GTP create session request also includes the trusted bearer requirement, although this requirement may be indicated through the trusted APN, P-GW ID, and PDN ID.
  • the S-GW transfers the S5 GTP create session request to the P-GW.
  • the PCRF processes the Diameter IP-CAN request to generate a Diameter IP-CAN response.
  • the PCRF identifies QoS and accounting rules based various data including the trusted bearer requirement.
  • the PCRF processes the trusted APN, IMSI, and ULI to select a new QCI and AMBR for the trusted bearer.
  • the PCRF also processes the trusted APN and serving network to select order a hardware trust verification for the UE.
  • the PCRF is able to implement trust policies on an individual trusted bearer basis.
  • the Diameter IP-CAN response indicates the new QCI, new AMBR, trusted bearer requirement, and the new requirement to verify hardware trust on the UE.
  • the PCRF transfers the Diameter IP-CAN response to the P-GW.
  • the P-GW processes the Diameter IP-CAN response to generate an S5 GTP create session response.
  • the S5 GTP create session response indicates the EPS bearer ID, P-GW TEID-U, P-GW TEID-C, trusted APN, trusted P-GW ID, trusted PDN ID, PDN type, UE IP, new QCI, and new AMBR.
  • the S5 GTP create session request includes the trusted bearer requirement, although this requirement may be indicated through the trusted APN, P-GW ID, and PDN ID.
  • the S5 GTP create session request indicates the requirement to verify hardware trust on the UE.
  • the P-GW transfers the S5 GTP create session response to the S-GW.
  • the S-GW processes the S5 GTP create session response to generate an S11 GTP create session response.
  • the S11 GTP create session response indicates the EPS bearer ID, S-GW TEID-U, S-GW TEID-C, trusted APN, trusted P-GW ID, trusted PDN ID, PDN type, UE IP, new QCI, and new AMBR.
  • the S11 GTP create session request also includes the trusted bearer requirement, although this requirement may be indicated through the trusted APN, P-GW ID, and PDN ID.
  • the S11 GTP create session request indicates the requirement to verify hardware trust on the UE.
  • the S-GW transfers the S11 GTP create session response to the MME.
  • the MME processes the S11 GTP create session response to generate an S1-AP initial context set-up request.
  • the S1-AP initial context set-up request indicates S1-AP IDs for the MME, eNodeB, and UE.
  • the S1-AP initial context set-up request indicates the TEID for the control plane.
  • the S1-AP initial context set-up request also has the trusted APN, trusted PDN ID, UE IP, new QCI, new AMBR, and the trusted bearer requirement, although this requirement may be indicated through the trusted APN and trusted PDN ID.
  • the S1-AP initial context set-up request indicates the requirement to verify hardware trust on the UE - although this could be transferred in the NAS response from the MME to the eNodeB.
  • the MME transfers the S1-AP initial context set-up request to the eNodeB.
  • the eNodeB processes the S1-AP initial context set-up request to generate an RRC connection reconfiguration message.
  • the RRC connection reconfiguration message indicates the radio bearer and NAS information.
  • the RRC connection reconfiguration message indicates the trusted bearer requirement.
  • the RRC connection reconfiguration message also indicates the requirement to verify hardware trust on the UE - possibly in the NAS information.
  • additional messaging is transferred between the UE, eNodeB, and MME before the MME transfers S11 modify bearer signaling to the S-GW which transfers S5/S8 modify bearer signaling to the P-GW.
  • the eNodeB, S-GW, and P-GW exchange user data between the UE and other communication nodes over trusted hardware.
  • the MME transfers the requirement to verify hardware trust of the UE to the trust server.
  • the trust server transfers a random number challenge to the UE, and the UE returns a hash result based on the random number and its shared secret key.
  • the trust server verifies the hash result using the random number and its own version of the shared secret key.
  • the random number and hash result may be exchanged with the UE for the trust server through the MME and NAS messaging.
  • the trust server reports the successful verification of the hardware trust for the UE to the MME.
  • the trust server and UE communicate through the eNodeB, S-GW, and P-GW over the trusted bearer responsive to NAS data from the MME.
  • the MME and P-GW may block external data communications for the UE until successful hardware validation is completed by the trust server on the UE.
  • the hardware validation of the UE may be contemporaneous with the use of the trusted bearer, and an alarm could indicate an untrusted UE.
  • Other end-point UEs and access networks may be operated in a like manner and federated to form end-to-end LTE bearers on-demand that are trusted at the hardware layer.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Description

    TECHNICAL BACKGROUND
  • Data communication systems transfer data packets between user devices and machines to provide data communication services like internet access, media streaming, and user messaging. Wireless communication systems allow users to move about and communicate over the air with access communication networks. Wireless data networks provide mobile internet access, mobile media streaming, and mobile user messaging.
  • Long Term Evolution (LTE) is a popular wireless data technology. Using LTE, a wireless User Equipment (UE) detects an evolved-NodeB (eNodeB) base station and responsively exchanges Radio Resource Configuration (RRC) signaling with the eNodeB. The eNodeB then transfers an S1-Application Protocol (S1-AP) message to a Mobility Management Entity (MME), and the MME transfers a Diameter request message to a Home Subscriber System (HSS). These messages transport data for the UE like the International Mobile Subscriber Identifier (IMSI), Public Land Mobile Network (PLMN), Radio Access Technology (RAT) type, and serving network.
  • The HSS processes the IMSI, PLMN, RAT type, and serving network to select an Access Point Name (APN). The HSS transfers a Diameter response to the MME indicating the APN and associated APN information like a Packet Data Network Gateway (P-GW) Identifier (ID), Packet Data Network (PDN) type, default Quality-of-Service Class Identifier (QCI), and default Aggregate Maximum Bit Rate (AMBR).
  • The MME processes the Diameter response message to generate an S11 General Packet Radio Service Transfer Protocol (GTP) message. The S11 GTP message indicates the APN and P-GW ID among other data. The MME transfers the S11 GTP create session request to a Serving Gateway (S-GW). The S-GW processes the S11 GTP message to generate an S5 GTP message. The S5 GTP message also includes the APN and P-GW ID. The S-GW transfers the S5 GTP create session request to the P-GW.
  • The P-GW processes the APN and other data to identify an IP address for the UE. The P-GW processes the S5 GTP message to transfer a Diameter request to a Policy Charging Rules Function (PCRF). The Diameter request indicates the APN, default QCI, and default AMBR. The PCRF applies QoS and accounting rules for the UE based various data inputs. For example, the PCRF may change a QCI or AMBR for a UE based on its APN, IMSI, and PLMN. The PCRF transfers the Diameter response to the P-GW.
  • The P-GW processes the Diameter response to generate an S5 GTP response. The S5 GTP response indicates the UE IP address and any new QCIs or AMBRs. The P-GW transfers the S5 GTP response to the S-GW, and the S-GW transfers a corresponding S11 GTP response to the MME. The MME processes the S11 GTP response to generate an S1-AP message that indicates the UE IP address, the GTP Tunnel Endpoint Identifiers (TEIDs) for the user and control planes, the QCI, AMBR, and the like. The MME transfers the S1-AP message to the eNodeB. The eNodeB processes the S1-AP message to transfer an RRC message to the UE that indicates the UE IP address, radio bearer, and Non-Access Stratum (NAS) information. The UE, eNodeB, and MME exchange additional messaging to set context before the MME transfers S11 modify bearer signaling to the S-GW, and the S-GW transfers S5 modify bearer signaling to the P-GW. The UE may then exchange user data over the eNodeB, S-GW, and P-GW. Documents WO 2013/183971 and US 2010/235620 are relevant prior-art documents that teach the implementation of LTE data security features such as data encryption and integrity.
  • Hardware trust systems ensure network security and control. The hardware trust systems maintain physical separation between trusted hardware and untrusted hardware. The trust systems control software access to the trusted hardware but allow interaction between open and secure software components through secure bus interfaces, memories, time slices, and switching circuits. The trust systems establish trust with one another by using secret keys embedded in their hardware to generate hash results for remote verification by other trust systems also knowing the secret keys and the hash algorithms. Unfortunately, the trust systems and the LTE systems are not effectively integrated.
  • TECHNICAL OVERVIEW
  • A Long Term Evolution (LTE) communication network transfers data communications for User Equipment (UE). An LTE gateway system exchanges hardware trust data with a server system to maintain hardware trust for the LTE gateway system. An LTE access node processes a Radio Resource Control (RRC) message that contains a trusted bearer requirement for the UE to generate an S1 Application Protocol (S1-AP) initial UE message that contains the trusted bearer requirement for the UE. An LTE management node processes the S1-AP initial UE message to generate a General Packet Radio Service Transfer Protocol (GTP) create session message that contains the trusted bearer requirement for the UE. The LTE gateway system exchanges user data for the UE between the LTE access node and a communication node responsive to the GTP create session message.
  • DESCRIPTION OF THE DRAWINGS
    • Figures 1-3 illustrate an LTE communication system to establish trusted bearers for UEs.
    • Figures 4-5 illustrate LTE networks to establish trusted bearers for UEs.
    • Figures 6-11 illustrate LTE and Diameter signaling to establish trusted bearers for UEs.
    DETAILED DESCRIPTION
  • The invention is defined by the independent claims 1 and 9. Figures 1-3 illustrate Long Term Evolution (LTE) communication system 100 to establish trusted bearers for User Equipment (UE) 101. LTE communication system 100 comprises UE 101, LTE access node 110, LTE management node 111, LTE gateway systems 112-113, communication nodes 130-131, and server system 140. UE 101 and LTE access node 110 communicate over Radio Resource Control (RRC) signaling link 122. LTE access node 110 and LTE management node 111 communicate over S1-AP signaling link 123. LTE management node 111 and LTE gateway systems 112-113 communicate over S11 General Packet Radio Service Transfer Protocol (GTP) signaling link 124.
  • UE 101 and LTE access node 110 also communicate over LTE bearer 102. LTE access node 110 and LTE gateway systems 112-113 communicate over respective LTE bearers 103-104. LTE gateway systems 112-113 and communication nodes 130-131 communicate over respective data links 105-106.
  • Server system 140 and UE 101 communicate over trust signaling link 141. Server system 140 and LTE access node 110 communicate over trust signaling link 142. Server system 140 and LTE management node 111 communicate over trust signaling link 143. Server system 140 and LTE gateway system 112 communicate over trust signaling link 144. Server system 140 and communication node 103 communicate over trust signaling link 145. Trust signaling links 141-145 may be transported by portions of signaling links 122-124 and bearers 102, 103, and 105. Note that server system 140 does not typically communicate with LTE gateway system 113 or with communication node 131.
  • UE 101 could be a phone, tablet computer, media device, or some other apparatus having a wireless LTE transceiver. UE 101 includes processing circuitry and memory that store and execute various software modules. UE 101 comprises communication transceivers, such as antennas, ports, bus interfaces, signal processors, memory, and software.
  • LTE access node 110 may be a wireless access node of various types such as an Enhanced Node B, picocell, femtocell, hotspot, repeater, and the like. LTE access node 110 includes components like an antenna, amplifier, modulator, computer, and communication ports. LTE access node 110 comprises processing circuitry and memory that store and execute various software modules, and LTE access node 110 may include virtual machines running on standard server systems.
  • LTE management node 111 may be a controller of various types like a Mobility Management Entity (MME), Home Subscriber System (HSS), and application server. LTE management node 111 includes a computer, bus interface, and communication ports that have processing circuitry and memory to store and execute various software modules. LTE management node 111 may comprise virtual machines running on standard server systems.
  • LTE gateway systems 112-113 may be packet gateways of various types like a Serving Gateway (S-GW), Packet Data Network Gateway (P-GW), High Speed Packet Access Gateway (HSPA-GW), High Rate Packet Data Gateway (HRPD-GW), Evolved Packet Data Gateway (ePDG), Multimedia Broadcast Multicast Service Gateway (M-GW), Broadcast Multicast Service Center (BM-SC), and/or some other type of data packet interface into an LTE system. LTE gateway systems 112-113 typically include Policy Charging and Rules Functions (PCRFs) and On-line Charging Systems (OCSs) as well. LTE gateway systems 112-113 include computers, bus interfaces, and communication ports that comprise processing circuitry and memory devices to store and execute various software modules. LTE gateway systems 112-113 may comprise virtual machines running on standard server systems.
  • Server system 140 establishes and maintains hardware trust with the hardware in LTE gateway system 112, and typically with the other hardware systems in UE 101, access node 110, and communication node 130. The hardware trust is first established within each hardware system that supports elements 101, 110, 112, and 130 by loading trust software modules to assert physical control over data access to hardware microprocessors, bus interfaces, memories, communication ports, and the like. The trust software modules read secret keys physically embedded in the hardware and transfer encoded versions of the secret keys to server system 140 to maintain hardware trust. For example, server system 140 might repeatedly transfer random numbers to gateway system 112, and system 112 would then perform a one-way hash on the random numbers with its secret key and return the hash results to server system 140. Server system 140 then compares the received hash results to its own self-generated hash results to verify the hardware trust of gateway system 112. Server system 140 includes a computer, bus interface, and communication ports that comprise processing circuitry and memory to store and execute various software modules. Server system 140 may include virtual machines running on standard server systems.
  • Communication nodes 130-131 comprise routers, switches, servers, databases, computers, user devices, or some other type of packet communication system.
  • In the following discussion, signaling messages are enumerated with the same reference numerals as the signaling links that they traverse. For example, an RRC message on RRC signaling link 122 is referred to as RRC message 122.
  • In operation, LTE gateway system 112 exchanges hardware trust data 144 with server system 140 to maintain hardware trust for LTE gateway system 112. Server system 140 may also exchange hardware trust data with UE 101, access node 110, and communication node 130, but server system 140 does not exchange hardware trust data with gateway system 113 or communication node 131.
  • UE 101 wirelessly synchronizes with LTE access node 110 during an initial RRC procedure over RRC link 122. UE 101 then transfers RRC message 122 to access node 110 that contains a trusted bearer requirement for UE 101. The trusted bearer requirement means that UE 101 should only communicate over hardware systems that are trusted by server system 140. The trusted bearer requirement may be indicated by an RRC Establishment Cause, Non-Access Stratum (NAS) information, or some other data field in RRC message 122.
  • LTE access node 110 processes RRC message 122 that contains the trusted bearer requirement for UE 101 to generate S1-AP initial UE message 123 that contains the trusted bearer requirement for UE 101. The trusted bearer requirement may be indicated by the Establishment Cause, NAS information, or some other data field in S1-AP message 123. LTE access node 110 transfers S1-AP initial UE message 123 that contains the trusted bearer requirement to LTE management node 111.
  • LTE management node 111 processing S1-AP initial UE message 123 to generate S11 GTP create session message 124 that contains the trusted bearer requirement for UE 101. The trusted bearer requirement may be indicated by Tunnel Endpoint Identifier (TEID) data, Access Point Name (APN) data, or some other data field in S11 GTP signaling 124.
  • UE 101 and LTE access node 110 wirelessly exchange user data over bearer 102. LTE access node 110 and LTE gateway system 112 exchange the user data over bearer 103. LTE gateway system 112 and communication node 130 exchange the user data over communication link 105 responsive to S11 GTP create session message 124.
  • In some examples, an MME in LTE management node 111 processes S1-AP initial UE message 123 to generate a Diameter message that contains the trusted bearer requirement for UE 101. An HSS in LTE management node 111 then processes the trusted bearer requirement in the Diameter message to generate a Diameter response that contains an Access Point Name (APN) for trusted LTE gateway system 112. If the trusted bearer requirement were not in the Diameter message, then the HSS could have selected a different APN for untrusted gateway system 113. The MME processes the Diameter response with the APN for trusted LTE gateway system 112 to generate S11 GTP create session message 124. Specifically, the MME processes the APN to identify a P-GW in LTE gateway system 112.
  • In some examples, an S-GW in LTE gateway system 112 processes S11 GTP create session message 124 having the trusted bearer requirement to generate an S5 GTP create session message that contains the trusted bearer requirement for UE 101. A P-GW in LTE gateway system 112 then processes the S5 GTP create session message to generate a Diameter message that contains the trusted bearer requirement. A PCRF in LTE gateway system 112 processes the Diameter message having the trusted bearer requirement for UE 101 to generate a Diameter response that contains additional requirements for the trusted bearer for UE 101. The P-GW processes the Diameter response to implement the trusted bearer for UE 101.
  • In some examples, LTE access node 110 exchanges hardware trust data with server system 140 to maintain hardware trust for a trusted hardware partition of LTE access node 110. LTE access node 110 exchanges the user data between UE 101 and LTE gateway system 112 through the trusted hardware partition of LTE access node 110 responsive to the trusted bearer requirement for UE 101 in RRC signaling 122 and/or S1-AP signaling 123.
  • Referring to Figure 2, LTE gateway system 112 exchanges hardware trust data 124 with trusted server system 140 to maintain hardware trust for gateway system 112 (201). LTE access node 110 processes RRC message 122 that contains a trusted bearer requirement for UE 101 to generate S1-AP initial UE message 123 that contains the trusted bearer requirement for UE 101 (202). The trusted bearer requirement means that UE 101 should communicate over hardware systems that are trusted by server system 140. LTE management node 111 processes S1-AP initial UE message 123 that contains the trusted bearer requirement for UE 101 to generate S11 GTP create session message 124 that contains the trusted bearer requirement for UE 101 (203). LTE gateway system 112 exchanges user data for UE 101 between LTE access node 110 and communication node 130 responsive to S11 GTP create session message 124 (204). Note that additional LTE messaging takes place in a supporting and contemporaneous manner to that above in order to implement this LTE bearer, but this supporting signaling has been omitted from the discussion for clarity to teach innovative aspects.
  • Referring to Figure 3, an exemplary configuration and operation for LTE communication system 100 is described, although system features may vary in other examples. Various network elements are shown on Figure 3 with their home system indicated in parentheses. For example, an MME is shown with a parenthetical notation for LTE management node 111, and a P-GW is shown with a parenthetical notation for LTE gateway system 112. For clarity, these networks elements are enumerated below using the reference numerals of their home systems, so the MME is referred as MME 111, and the P-GW is referred to as P-GW 112.
  • Trust server 140 exchanges hardware trust data with NodeB 110 to establish and maintain remote hardware trust for trusted NodeB 110. Trust server 140 exchanges hardware trust data with S-GW 112 to establish and maintain remote hardware trust for trusted S-GW 112. Trust server 140 exchanges hardware trust data with P-GW 112 to establish and maintain remote hardware trust for trusted P-GW 112. Although not shown on Figure 3, trust server 140 may also exchange hardware trust data with UE 101 to establish and maintain hardware trust for UE 101. The hardware trust verification for UE 101 may be periodic or be performed in response to UE rules in HSS 111 or in PCRF 112.
  • UE 101 transfers an RRC message to NodeB 110 that contains a trusted bearer requirement for UE 101. The trusted bearer requirement means that UE 101 should only communicate over hardware systems that are trusted by trust server 140. The trusted bearer requirement may be indicated by an RRC Establishment Cause, NAS information, or some data other field in the RRC signaling. NodeB 110 processes the RRC message with the trusted bearer requirement to generate an S1-AP initial UE message that contains the trusted bearer requirement for UE 101. NodeB 110 transfers the S1-AP initial UE message to MME 111.
  • MME 111 processes the S1-AP initial UE message to generate a Diameter message that contains the trusted bearer requirement for UE 101. The MME transfers the Diameter message to HSS 111. HSS 111 processes the trusted bearer requirement for UE 101 from the Diameter message to identify a trusted APN for trusted P-GW 112. HSS 111 sends a Diameter response to MME 111 having the trusted APN.
  • MME 111 processes the Diameter response with the trusted APN for trusted P-GW 112 to generate an S11 GTP create session message. MME 111 transfers the S11 GTP create session message with the trusted APN to trusted S-GW 112. Trusted S-GW 112 processes the S11 GTP create session message having the trusted APN to generate an S5 GTP create session message that contains the trusted APN for UE 101. S-GW 112 transfers the S5 GTP create session message to trusted P-GW 112.
  • Trusted P-GW 112 processes the S5 GTP create session message to generate a Diameter message that contains the trusted APN. P-GW 112 transfers the Diameter message with the trusted APN to PCRF 112. PCRF 112 processes the Diameter message having the trusted APN for UE 101 to identify a Quality-of-Service (QoS) Class Indicator for a trusted bearer for UE 101. PCRF 112 transfers a Diameter response that contains the trust QCI - and possibly additional trust requirements for the trusted bearer. For example, PCRF 112 may process the APN and a UE ID to add a requirement that trust server 140 perform a hardware trust verification on UE 101 during the data session.
  • P-GW 112 processes the Diameter response to generate and transfer an S5 GTP create session response with the trust QCI to S-GW 112. S-GW 112 processes the S5 GTP create session response to generate and transfer an S11 GTP create session response with the trust QCI to MME 111. MME 111 processes the S11 GTP create session response to generate and transfer an S1-AP initial context set-up request with the trust QCI to NodeB 110. NodeB 110 processes the S1-AP initial context set-up request to generate and transfer an RRC connection reconfiguration message with the trust QCI to UE 101.
  • In response to the above messaging, UE 101 and trusted NodeB 110 wirelessly exchange user data over trusted bearer 102 based on the trust QCI. Trusted NodeB 110 and trusted S-GW 112 exchange the user data over trusted bearer 103 based on the trust QCI. Trusted S-GW 112 and trusted P-GW 112 exchange the user data over a trusted bearer based on the trust QCI. Trusted P-GW 112 exchanges the user data with communication node 130 over trusted data link 105 based on the trust QCI.
  • As stated above, additional LTE messaging takes place in a supporting and contemporaneous manner to that above in order to implement this LTE bearer. This supporting signaling has been omitted from the discussion for clarity to teach innovative aspects.
  • Figure 4 illustrates LTE communication network 400 to establish a trusted bearer for UE 401. LTE communication network 400 is an example of communication system 100, although system 100 may use alternative configurations and operations. LTE communication network 400 comprises UE 401, eNodeB 410, S-GW 411, P-GW 412, communication node 413, MME 415, HSS 416, PCRF 417, S-GW 421, P-GW 422, communication node 423, S-GW 431, P-GW 432, communication node 433, and trust server 440.
  • Trust server 440 establishes and maintains hardware trust with UE 401, eNodeB 410, S-GW 411, P-GW 412, and communications node 413. The hardware trust is first established within each hardware system that operates network elements 401, 410, 411, 412, 413, 440 by loading trust software modules to assert physical control over data access to hardware microprocessors, bus interfaces, memories, communication ports, and the like. The trust software modules read secret keys physically embedded in the hardware and transfer encoded versions of the secret keys to maintain hardware trust. In this example, trust server 440 repeatedly transfers random numbers to UE 401, eNodeB 410, S-GW 411, P-GW 412, and communications node 413, and these systems hash the random numbers with their secret keys to return hash results to trust server 440. Trust server 440 then compares the received hash results to self-generated hash results to establish or verify the hardware trust.
  • Through a power-up, movement, or hand-over, UE 401 detects eNodeB 410 and responsively exchanges LTE RRC signaling with eNodeB 410. The RRC signaling exchange includes a trusted bearer requirement from UE 401. The trusted bearer requirement may be triggered in UE 401 by a mode switch, application, location, time, and the like. The trusted bearer requirement may be included in the Establishment Cause, NAS information, and/or some other portion of the RRC signaling. If the RRC signaling indicates a trusted bearer requirement for UE 401, then eNodeB 410 allocates trusted hardware to exchange resource blocks with UE 401. In some cases, only trusted hardware is available in eNodeB 410.
  • eNodeB 410 transfers an S1-AP message to MME 415 that indicates the trusted bearer requirement for UE 401 in response to the trusted bearer requirement in the RRC signaling. MME 415 transfers a Diameter request message to HSS 416 that indicates the trusted bearer requirement for UE 401 responsive to the trusted bearer requirement in the S1-AP message. HSS 416 processes the Diameter request message to generate a Diameter response message. Specifically, HSS 416 processes the trusted bearer requirement to select a trusted APN that uses trusted hardware. Typically, HSS 416 also processes the IMSI, PLMN, RAT type, and serving network to further refine the trusted APN selection. In this example, HSS 416 selects an APN that uses trusted gateways 411-412 and communication node 413 in response to the trusted bearer requirement. HSS 416 transfers the Diameter response message to MME 415. The Diameter response message indicates the trusted APN and associated APN information like a trusted P-GW ID, PDN type, default QCI, and default AMBR data.
  • MME 415 processes the Diameter response message to generate an S11 GTP message. The S11 GTP message indicates the trusted APN and trusted P-GW ID among other data. MME 415 transfers the S11 GTP create session request to S-GW 411. S-GW 411 processes the S11 GTP message to generate an S5 GTP message. The S5 GTP message also includes trusted APN and trusted P-GW ID. S-GW 411 transfers the S5 GTP create session request to P-GW 412.
  • P-GW 412 processes the trusted APN and other data to identify an IP address for UE 401. P-GW 412 processes the S5 GTP message to transfer a Diameter request to PCRF 417. The Diameter request indicates the trusted APN, default QCI, and default AMBR. PCRF 417 processes the Diameter request to generate a Diameter response. In particular, PCRF 417 applies QoS and accounting rules for UE 401 based various data inputs including the trusted bearer requirement. For example, PCRF 417 may process the trusted APN and serving network ID to select a new QCI for the trusted bearer for UE 401. PCRF 417 may also apply trust policies, such as on-demand UE and/or gateway hardware verification and the like. PCRF 417 transfers the Diameter response to P-GW 412.
  • P-GW 412 processes the Diameter response to generate an S5 GTP response. The S5 GTP response indicates the UE IP address and any new QCIs, AMBRs, and trust requirements. P-GW 412 transfers the S5 GTP response to S-GW 411. S-GW 411 processes the S5 GTP response to generate an S11 GTP response. The S11 GTP response indicates the UE IP address and any new QCIs, AMBRs, and trust requirements. S-GW 411 transfers the S11 GTP response to MME 415.
  • MME 415 processes the S11 GTP response to generate an S1-AP message. The S1-AP message indicates the UE IP address, the GTP TEIDs for the user and control planes, the QCI, AMBR, and the like. MME 415 transfers the S1-AP message to eNodeB 410. eNodeB 410 processes the S1-AP message to generate an RRC message that indicates the UE IP address, radio bearer, and NAS information. eNodeB 410 transfers the RRC message to UE 401. UE 401, eNodeB 410, and MME 415 exchange additional messaging to set context before MME 415 transfers S11 modify bearer signaling to S-GW 411, and S-GW 411 transfers S5 modify bearer signaling to P-GW 412. UE 401 and communication node 413 then exchange user data over eNodeB 410, S-GW 411, and P-GW 412 - all using trusted hardware.
  • Trust server 440 does not establish hardware trust with S-GW 421, P-GW 422, and communications node 423. In another example, UE 401 detects eNodeB 410 and responsively exchanges LTE RRC signaling with eNodeB 410. This RRC signaling exchange does not include the trusted bearer requirement for UE 401. The lack of the trusted bearer requirement may be due to a mode switch, location, application, time, or the like. If the RRC signaling does not indicate the trusted bearer requirement, then eNodeB 410 does not need to allocate trusted hardware for UE 401, although only trusted hardware may be available. In addition, the resulting S1-AP message to MME 415 does not include the trusted bearer requirement, so a trusted APN is not required. Thus, HSS 416 may select an APN that uses untrusted hardware in S-GW 421, P-GW 422, and communications node 423.
  • Figure 5 illustrates LTE communication network 500 to establish a trusted bearer for UE 501. LTE communication network 500 is an example of communication system 100 and network 400, although system 100 and network 400 may use alternative configurations and operations. LTE communication network 500 comprises UE 501, femtocell 510, data centers 1-N, and communication nodes 1-N. Data centers 1-N each host various virtual machine network elements including S-GW, P-GW, MME, HSS, PCRF, and the like. Data centers 1 and N include trust systems to verify hardware trust. Data center 2 does not have a trust system. The trust systems maintain hardware trust at data centers 1 and N through the exchange of challenge data using shared secret keys.
  • UE 501 detects femtocell 510 and responsively exchanges LTE RRC signaling with femtocell 510. The RRC signaling exchange includes a trusted bearer requirement from UE 501. The trusted bearer requirement may be triggered in UE 501 by a mode switch, application, location, time, and the like. The trusted bearer requirement may be included in the Establishment Cause, NAS information, and/or some other portion of the RRC signaling. If the RRC signaling indicates a trusted bearer requirement for UE 501, then femtocell 510 allocates trusted hardware to exchange the resource blocks with UE 501, although only trusted hardware may be available in femtocell 510.
  • Femtocell 510 transfers an S1-AP message to an MME in data center #1 that indicates the trusted bearer requirement for UE 501 in response to the trusted bearer requirement in the RRC signaling. The MME transfers a Diameter request to the HSS. The HSS selects a trusted APN that uses trusted hardware responsive to the trusted bearer requirement. In this example, the HSS selects an APN that uses trusted data center #1 and trusted communication node #1. The HSS transfers a Diameter response to the MME. The Diameter response indicates the trusted APN and associated APN information like a trusted P-GW ID, PDN type, default QCI, and default AMBR data.
  • The MME generates an S11 GTP message that indicates the trusted APN and trusted P-GW ID among other data. The MME transfers the S11 GTP create session request to the S-GW, and the S-GW transfers a corresponding S5 GTP message to the P-GW. The P-GW identifies an IP address for UE 501. The P-GW processes transfers a Diameter request to the PCRF indicating the trusted APN, trusted P-GW ID, default QCI, and default AMBR. The PCRF applies QoS and accounting rules for UE 501 based the trusted bearer requirement. For example, the PCRF may process the trusted APN to select a new AMBR for the trusted bearer. The PCRF may also apply trust policies, such as on-demand hardware verification for UE 501 and communication node #1. The PCRF transfers a Diameter response to the P-GW.
  • The P-GW generates an S5 GTP response that indicates the UE IP address and any new QCIs, AMBRs, and trust requirements. The P-GW transfers the S5 GTP response to the S-GW, and the S-GW transfers a corresponding S11 GTP response to the MME. The MME transfers an S1-AP message to femtocell 510 that indicates the GTP TEID, QCI, AMBR, and the like. Femtocell 510 transfers an RRC message to UE 501 that indicates the UE IP, radio bearer, and NAS information. UE 501 and communication node #1 then exchange user data over femtocell 510 and data center #1 using trusted hardware.
  • Subsequently, UE 501 detects femtocell 510 and responsively exchanges LTE RRC signaling with eNodeB 410. In this case, the RRC signaling does not include the trusted bearer requirement for UE 501. Femtocell 510 need not use trusted hardware for UE 501, although only trusted hardware may be available. In addition, the resulting S1-AP message to the MME does not include the trusted bearer requirement, so a trusted APN is not required. Femtocell 510 may use the MME in Data Center #2. The HSS may select an APN that uses untrusted hardware in data center #2. UE 501 and communication node #2 would then exchange user data over data center #2 using untrusted hardware.
  • Figures 6-10 illustrate LTE signaling 600 to establish trusted bearers for a UE. LTE signaling 600 is an example of the signaling used by system 100 and networks 400 and 500, although they may use alternative configurations and operations. Note that some signaling data and supporting signaling messages are omitted from the following discussion for clarity to teach innovative aspects.
  • In operation, an LTE UE detects wireless signaling from an eNodeB and begins an LTE RRC data exchange with the eNodeB. These initial random access RRC messages that set timing and establish a UE ID are not shown. The UE transfers an RRC connection request message to the eNodeB. The RRC connection request message includes UE Identifiers (IDs) like the Radio Network Temporary Identifier (RNTI) and International Mobile Subscriber Entity (IMSI). The RRC connection request message includes an Establishment Cause like Mobile-Originated Signaling (MO-SIG) or Mobile-Originated Data (MO-DATA). The RRC connection request message also includes a trusted bearer requirement for the UE. In some examples, the trusted bearer requirement is indicated by the Establishment Cause itself. In other examples, the trusted bearer requirement is transferred in other RRC signaling and is not provided in the RRC connection request message.
  • The eNodeB processes the Establishment Cause in the RRC connection set-up message to select resource blocks for the UE. If the Establishment Cause indicates the trusted bearer requirement for the UE, then the eNodeB allocates trusted hardware to exchange the resource blocks with the UE. Although not shown for clarity, the eNodeB returns an RRC connection set-up message with the pertinent LTE resource block information.
  • The UE transfers an RRC connection set-up complete message to the eNodeB. The RRC connection set-up complete message includes UE IDs like the IMSI. The RRC connection set-up complete message includes a Public Land Mobile Network (PLMN) ID, MME ID, and NAS information. The RRC connection set-up complete message also includes the trusted bearer requirement for the UE. In some examples, the trusted bearer requirement is indicated by the NAS information. In other examples, the trusted bearer requirement is transferred in other RRC signaling and is not provided in the RRC connection set-up complete message.
  • The eNodeB processes the RRC connection set-up complete message to generate an S1-AP message. The S1-AP message includes an eNodeB/UE ID and IMSI. The S1-AP message indicates an Evolved Packet System (EPS)/IMSI attachment for an initial connection. The S1-AP message includes User Location Information (ULI) like tracking area, cell ID, sector ID, and the like. The S1-AP message includes the PLMN and NAS info. The S1-AP message includes the trusted bearer requirement for the UE - possibly in the NAS information. The trusted bearer requirement for the UE in the S1-AP message is included in response to the trusted bearer requirement in the RRC messaging. The eNodeB transfers the S1-AP message to the MME. Thus, the eNodeB is able to implement trusted hardware for a UE on an individual attachment basis.
  • Referring to Figure 7, the MME transfers a Diameter Update Location Request message to the HSS. The Diameter Update Location Request message indicates host/realm for the origin and destination. The Diameter Update Location Request message indicates the IMSI, ULI, PLMN, RAT type, and the serving network. The Diameter Update Location Request message indicates the trusted bearer requirement for the UE responsive to the trusted bearer requirement in the S1-AP message.
  • The HSS processes the Diameter Update Location Request message to generate a Diameter Update Location Response message. The HSS processes the trusted bearer requirement from the request to select a trusted APN that uses trusted hardware systems. Typically, the IMSI, PLMN, RAT type, and the serving network are used to further refine trusted APN selection. For example, different combinations of IMSIs, PLMNs, and serving networks may yield different trusted APNs. Thus, the HSS is able to select trusted APNs and hardware for the UE on an individual attachment basis.
  • The HSS transfers the Diameter Update Location Response message to the MME. The Diameter Update Location Response message indicates that network access is granted to the UE. The Diameter Update Location Response message indicates the trusted APN and associated APN information like a trusted P-GW ID, trusted PDN ID, PDN type, QCI, AMBR data, and the trusted bearer requirement. The trusted bearer requirement may be indicated through the trusted APN, P-GW ID, and PDN ID.
  • Referring to Figure 8, the MME processes the Diameter Update Location Response message to generate an S11 GTP create session request. The S11 GTP create session request includes an Evolved Packet System (EPS) bearer ID and a GTP TEID for the MME control plane (MME TEID-C). The S11 GTP create session request identifies the IMSI, ULI, serving network, RAT type, trusted APN, trusted P-GW ID, trusted PDN ID, PDN type, QCI, and AMBR. The S11 GTP create session request also includes the trusted bearer requirement, although this requirement may be indicated through the trusted APN, P-GW ID, and PDN ID. The MME transfers the S11 GTP create session request to the S-GW.
  • The S-GW processes the S11 GTP create session request to generate an S5 GTP create session request. The S5 GTP create session request includes the EPS bearer ID and GTP TEIDs for the S-GW control and user planes (S-GW TEID-C and S-GW TEID-U). The S5 GTP create session request identifies the IMSI, ULI, serving network, RAT type, trusted APN, trusted P-GW ID, trusted PDN ID, PDN type, QCI, and AMBR. The S5 GTP create session request also includes the trusted bearer requirement, although this requirement may be indicated through the trusted APN, P-GW ID, and PDN ID. The S-GW transfers the S5 GTP create session request to the P-GW.
    1. 1. Referring to Figure 9, the P-GW processes the trusted APN and other data to identify an IP address for the UE. The P-GW processes the S5 GTP create session request to transfer a Diameter Internet Protocol Connectivity Access Network (IP-CAN) request to the PCRF. The Diameter IP-CAN request indicates the IMSI, UE IP, ULI, serving network, RAT type, trusted APN, trusted P-GW ID, trusted PDN ID, PDN type, QCI, and AMBR. The Diameter IP-CAN request also includes the trusted bearer requirement, although this requirement may be indicated through the trusted APN, P-GW ID, and PDN ID.
  • The PCRF processes the Diameter IP-CAN request to generate a Diameter IP-CAN response. In particular, the PCRF identifies QoS and accounting rules based various data including the trusted bearer requirement. In this example, the PCRF processes the trusted APN, IMSI, and ULI to select a new QCI and AMBR for the trusted bearer. The PCRF also processes the trusted APN and serving network to select order a hardware trust verification for the UE. Thus, the PCRF is able to implement trust policies on an individual trusted bearer basis. The Diameter IP-CAN response indicates the new QCI, new AMBR, trusted bearer requirement, and the new requirement to verify hardware trust on the UE. The PCRF transfers the Diameter IP-CAN response to the P-GW.
  • Referring to Figure 10, the P-GW processes the Diameter IP-CAN response to generate an S5 GTP create session response. The S5 GTP create session response indicates the EPS bearer ID, P-GW TEID-U, P-GW TEID-C, trusted APN, trusted P-GW ID, trusted PDN ID, PDN type, UE IP, new QCI, and new AMBR. The S5 GTP create session request includes the trusted bearer requirement, although this requirement may be indicated through the trusted APN, P-GW ID, and PDN ID. The S5 GTP create session request indicates the requirement to verify hardware trust on the UE. The P-GW transfers the S5 GTP create session response to the S-GW.
  • The S-GW processes the S5 GTP create session response to generate an S11 GTP create session response. The S11 GTP create session response indicates the EPS bearer ID, S-GW TEID-U, S-GW TEID-C, trusted APN, trusted P-GW ID, trusted PDN ID, PDN type, UE IP, new QCI, and new AMBR. The S11 GTP create session request also includes the trusted bearer requirement, although this requirement may be indicated through the trusted APN, P-GW ID, and PDN ID. The S11 GTP create session request indicates the requirement to verify hardware trust on the UE. The S-GW transfers the S11 GTP create session response to the MME.
  • Referring to Figure 11, the MME processes the S11 GTP create session response to generate an S1-AP initial context set-up request. The S1-AP initial context set-up request indicates S1-AP IDs for the MME, eNodeB, and UE. The S1-AP initial context set-up request indicates the TEID for the control plane. The S1-AP initial context set-up request also has the trusted APN, trusted PDN ID, UE IP, new QCI, new AMBR, and the trusted bearer requirement, although this requirement may be indicated through the trusted APN and trusted PDN ID. The S1-AP initial context set-up request indicates the requirement to verify hardware trust on the UE - although this could be transferred in the NAS response from the MME to the eNodeB. The MME transfers the S1-AP initial context set-up request to the eNodeB.
  • The eNodeB processes the S1-AP initial context set-up request to generate an RRC connection reconfiguration message. The RRC connection reconfiguration message indicates the radio bearer and NAS information. The RRC connection reconfiguration message indicates the trusted bearer requirement. The RRC connection reconfiguration message also indicates the requirement to verify hardware trust on the UE - possibly in the NAS information.
  • Although not shown for clarity, additional messaging is transferred between the UE, eNodeB, and MME before the MME transfers S11 modify bearer signaling to the S-GW which transfers S5/S8 modify bearer signaling to the P-GW. In response, the eNodeB, S-GW, and P-GW exchange user data between the UE and other communication nodes over trusted hardware.
  • Responsive to the PCRF trust order, the MME transfers the requirement to verify hardware trust of the UE to the trust server. In response, the trust server transfers a random number challenge to the UE, and the UE returns a hash result based on the random number and its shared secret key. The trust server verifies the hash result using the random number and its own version of the shared secret key. The random number and hash result may be exchanged with the UE for the trust server through the MME and NAS messaging. The trust server reports the successful verification of the hardware trust for the UE to the MME.
  • In some examples, the trust server and UE communicate through the eNodeB, S-GW, and P-GW over the trusted bearer responsive to NAS data from the MME. The MME and P-GW may block external data communications for the UE until successful hardware validation is completed by the trust server on the UE. Alternatively, the hardware validation of the UE may be contemporaneous with the use of the trusted bearer, and an alarm could indicate an untrusted UE. Other end-point UEs and access networks may be operated in a like manner and federated to form end-to-end LTE bearers on-demand that are trusted at the hardware layer.
  • The above description and associated figures teach the best mode of the invention. The following claims specify the scope of the invention. Note that some aspects of the best mode may not fall within the scope of the invention as specified by the claims. Those skilled in the art will appreciate that the features described above can be combined in various ways to form multiple variations of the invention. As a result, the invention is not limited to the specific embodiments described above, but only by the following claims and their equivalents.

Claims (15)

  1. A method of operating a Long Term Evolution, LTE, communication network (100, 400, 500, 600) to transfer data communications for User Equipment, UE, (101,401,501 comprising: in a first LTE gateway system (112, 411-412, 417), exchanging first hardware trust data with a trusted server system (140, 440) to maintain hardware trust for the first LTE gateway system (112, 411-412, 417),:
    in an LTE access node (110, 410, 510), processing a Radio Resource Control, RRC, message that contains a trusted bearer requirement for the UE (101, 401, 501) to generate an S1 Application Protocol, S1-AP, initial UE message that contains the trusted bearer requirement for the UE (101, 401, 501);
    in an LTE management node (111, 415 - 416), processing the S1-AP initial UE message to generate a General Packet Radio Service Transfer Protocol, GTP, create session message that contains the trusted bearer requirement for the UE (101, 401- 501); wherein processing the S1-AP initial UE message to generate the GTP create session message comprises:
    in a Mobility Management Entity, MME, (415) processing the S1-AP initial UE message to generate a Diameter message that contains the trusted bearer requirement for the UE (101);
    the MME (415) transferring the Diameter request message to a Home Subscriber System, HSS, (416), and
    in the HSS (416) processing the Diameter request message to select a trusted Access Point Name, APN, for the trusted first LTE gateway system (112, 411-412, 417), and to generate a Diameter response message that contains the selected trusted APN, and
    in the MME (415), processing the Diameter response having the trusted Access Point Name, APN, for the trusted first LTE gateway system (112, 411-412, 417) to generate the GTP create session message that contains the trusted APN for the UE (101, 401, 501), and
    in the trusted first LTE gateway system (112, 411-412, 417), exchanging user data for the UE (101, 401, 501) between the LTE access node (110, 410, 510) and a communication node (130, 413) responsive to the GTP create session message.
  2. The method of claim 1 wherein processing the RRC message that contains the trusted bearer requirement comprises processing an establishment cause in the RRC message.
  3. The method of claim 1 wherein processing the RRC message that contains the trusted bearer requirement comprises processing Non-Access Stratum, NAS, data in the RRC message.
  4. The method of claim 1 wherein processing the S1-AP initial UE message to generate the GTP create session message comprises, in the MME (415), processing the Diameter response that contains the trusted APN for the first LTE gateway system (112, 411-412, 417) to identify a Packet Data Network Gateway, P-GW, (412) in the first gateway system (112, 411-412, 417).
  5. The method of claim 1 wherein the GTP create session message comprises an S11 GTP create session message and wherein exchanging the user data for the UE (101, 401, 501) between the LTE access node (112, 411-412, 417).and the communication node (130, 413) comprises:
    in a Serving Gateway, S-GW, (411), processing the S11 GTP create session message to generate an S5 GTP create session message that contains a trusted Access Point Name, APN, for the trusted bearer for the UE (101, 401, 501); and
    in a Packet Data Network Gateway, P-GW, (412), processing the S5 GTP create session message that contains the trusted APN for the UE (101, 401, 501) to generate a Diameter message that contains the trusted APN for the UE (101, 401, 501) and processing a Diameter response having a trusted Quality-of-Service Class Indicator, QCI, for a trusted bearer for the UE (101, 401, 501).
  6. The method of claim 5 wherein exchanging the user data for the UE (101, 401, 501) between the LTE access node (110, 410, 510) and the communication node (130, 413) comprises, in a Policy Control and Rules Function, PCRF, (417), processing the Diameter message that contains the trusted APN for the UE (101, 401, 501) to generate the Diameter response that contains the trusted QCI for the trusted bearer for the UE (101, 401, 501).
  7. The method of claim 1 further comprising:
    in the LTE access node (110, 410, 510), exchanging additional hardware trust data with the trusted server system (140, 440) to maintain remote hardware trust for a trusted hardware partition of the LTE access node (110, 410, 510);
    in the LTE access node (110, 410, 510), exchanging the user data between the UE (101, 401, 501) and the first LTE gateway system (130, 413) through the trusted hardware partition of the LTE access node (110, 410, 510).
  8. The method of claim 7 wherein exchanging the user data between the UE (101, 410, 510) and the first LTE gateway system (112, 411-412, 417) through the trusted hardware partition of the LTE access node (110, 410, 510) comprises exchanging the user data through the trusted hardware partition responsive to an S1-AP initial context set-up message from a Mobility Management Entity, MME, that contains the trusted QCI for the trusted bearer for the UE (101, 401, 501).
  9. A Long Term Evolution, LTE, communication network (100, 400, 500, 600) comprising a first LTE gateway system (112, 411-412, 417), an LTE access node (110, 410, 510), and an LTE management node (111, 415 - 416), to transfer data communications for User Equipment, UE, (101, 401, 501), the LTE communication network (100, 400, 500, 600) comprises:
    the first LTE gateway system (112, 411-412, 417) configured to exchange first hardware trust data with a trusted server system (140, 440) to maintain hardware trust for the first LTE gateway system (112, 411-412, 417);
    the LTE access node (110, 410, 510) configured to process a Radio Resource Control, RRC, message that contains a trusted bearer requirement for the UE (101, 401, 501) to generate an S1 Application Protocol, S1-AP, initial UE message that contains the trusted bearer requirement for the UE (101, 401, 501);
    the LTE management node (111, 415 - 416) configured to process the S1-AP initial UE message to generate a General Packet Radio Service Transfer Protocol, GTP, create session message that contains the trusted bearer requirement for the UE (101, 401, 501); wherein the LTE management node (111, 415 -416) comprises
    a Mobility Management Entity, MME, (415) configured to process the S1-AP initial UE message to generate to a Home Subscriber System a Diameter message that contains the trusted bearer requirement for the UE (101, 401, 501) and process from the Home Subscriber System a Diameter response having a trusted Access Point Name, APN, for the trusted first LTE gateway system (112, 411-412, 417) to generate the GTP create session message that contains the trusted APN for the UE (101, 401, 501), and
    the Home Subscriber System, HSS, (416) configured to process the Diameter message that contains the trusted bearer requirement for the UE (101, 401, 501), to select the trusted APN for the trusted first LTE gateway system (112, 411-412, 417), and to generate the Diameter response to the MME that contains the selected trusted APN, and
    the trusted first LTE gateway system (112, 411-412, 417) configured to exchange user data for the UE (101, 401, 501) between the LTE access node (110, 410, 510) and a communication node (130, 413) responsive to the GTP create session message.
  10. The LTE communication network (100, 400, 500, 600) of claim 9 wherein the trusted bearer requirement comprises an establishment cause in the RRC message.
  11. The LTE communication network (100, 400, 500, 600) of claim 9 wherein the trusted bearer requirement comprises Non-Access Stratum, NAS, data in the RRC message.
  12. The LTE communication network (100, 400, 500, 600) of claim 9 wherein the LTE management node (111, 415-416) comprises the MME (415) configured to process the Diameter response that contains the trusted APN for the first LTE gateway system (112, 411-412, 417) to identify a Packet Data Network Gateway, P-GW, (412) in the first gateway system (112, 411-412, 417).
  13. The LTE communication network (100, 400, 500, 600) of claim 9 wherein the LTE gateway system (112, 411-412, 417) comprises:
    a Serving Gateway, S-GW, (411) configured to process an S11 GTP create session message to generate an S5 GTP create session message that contains a trusted APN for the UE (101, 501, 501); and
    a Packet Data Network Gateway, P-GW, (412) configured to process the S5 GTP create session message that contains the trusted APN for the UE (101, 401, 501) to generate a Diameter message that contains the trusted APN for the UE (101, 401, 501) and to process a Diameter response having a trusted Quality-of-Service Class Indicator, QCI, for a trusted bearer for the UE (101, 401, 501).
  14. The LTE communication network (100, 400, 500, 600) of claim 13 wherein the LTE gateway system (112, 411-412, 417) comprises a Policy Control and Rules Function, PCRF, (417) configured to process the Diameter message having the trusted APN for the UE (101, 401, 501) to generate the Diameter response having the trusted QCI for the trusted bearer for the UE (101, 401, 501).
  15. The LTE communication network (100, 400, 500, 600) of claim 9 wherein the LTE access node (110, 410, 510) is configured to:
    exchange additional hardware trust data with the trusted server system (140, 440) to maintain remote hardware trust for a trusted hardware partition of the LTE access node (110, 410, 510); and
    exchange the user data between the UE (101, 401, 501) and the first LTE gateway system (112, 411-412, 417) through the trusted hardware partition of the LTE access node. (110, 410, 510).
EP16707302.2A 2015-02-09 2016-02-08 Long term evolution (lte) communications over trusted hardware Active EP3257294B1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US14/617,498 US9191865B1 (en) 2015-02-09 2015-02-09 Long term evolution (LTE) communications over trusted hardware
PCT/US2016/016924 WO2016130447A1 (en) 2015-02-09 2016-02-08 Long term evolution (lte) communications over trusted hardware

Publications (2)

Publication Number Publication Date
EP3257294A1 EP3257294A1 (en) 2017-12-20
EP3257294B1 true EP3257294B1 (en) 2020-07-01

Family

ID=54434764

Family Applications (1)

Application Number Title Priority Date Filing Date
EP16707302.2A Active EP3257294B1 (en) 2015-02-09 2016-02-08 Long term evolution (lte) communications over trusted hardware

Country Status (4)

Country Link
US (2) US9191865B1 (en)
EP (1) EP3257294B1 (en)
CA (1) CA2976033C (en)
WO (1) WO2016130447A1 (en)

Families Citing this family (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9578664B1 (en) * 2013-02-07 2017-02-21 Sprint Communications Company L.P. Trusted signaling in 3GPP interfaces in a network function virtualization wireless communication system
JPWO2016079992A1 (en) * 2014-11-21 2017-08-31 日本電気株式会社 COMMUNICATION DEVICE, COMMUNICATION METHOD, COMMUNICATION SYSTEM, AND STORAGE MEDIUM
US9900761B2 (en) * 2015-04-27 2018-02-20 At&T Intellectual Property I, L.P. System and method for direct tunneling in point-to-multipoint mobile service
US9565168B1 (en) * 2015-05-05 2017-02-07 Sprint Communications Company L.P. System and method of a trusted computing operation mode
US9686240B1 (en) 2015-07-07 2017-06-20 Sprint Communications Company L.P. IPv6 to IPv4 data packet migration in a trusted security zone
US9749294B1 (en) 2015-09-08 2017-08-29 Sprint Communications Company L.P. System and method of establishing trusted operability between networks in a network functions virtualization environment
US10542115B1 (en) 2015-10-01 2020-01-21 Sprint Communications Company L.P. Securing communications in a network function virtualization (NFV) core network
US9811686B1 (en) 2015-10-09 2017-11-07 Sprint Communications Company L.P. Support systems interactions with virtual network functions in a trusted security zone
US9781016B1 (en) 2015-11-02 2017-10-03 Sprint Communications Company L.P. Dynamic addition of network function services
US9967745B2 (en) 2016-02-02 2018-05-08 Sprint Communications Company L.P. Hardware-trusted network bearers in network function virtualization infrastructure (NFVI) servers that execute virtual network functions (VNFS) under management and orchestration (MANO) control
JP2017191508A (en) * 2016-04-14 2017-10-19 富士通株式会社 Information processing device and connection information setting program
EP3713269B1 (en) * 2016-07-15 2022-09-07 Telefonaktiebolaget LM Ericsson (publ) Access control in communications network comprising slices
DE112017004736T5 (en) * 2016-09-21 2019-06-19 Mavenir Systems, Inc. Method and system for session resilience in packet gateways
US10250498B1 (en) 2016-10-03 2019-04-02 Sprint Communications Company L.P. Session aggregator brokering of data stream communication
US9980144B1 (en) * 2017-04-13 2018-05-22 Sprint Communications Company L.P. Hardware-trusted wireless data communications over a wireless relay
CN109327883B (en) 2017-07-31 2023-07-14 华为技术有限公司 Method and device for transmitting information
US10348488B1 (en) 2017-08-25 2019-07-09 Sprint Communications Company L.P. Tiered distributed ledger technology (DLT) in a network function virtualization (NFV) core network
US10932098B1 (en) * 2018-02-15 2021-02-23 Sprint Communications Company L.P. Mobility management entity selection by establishment cause
US20210105611A1 (en) * 2019-10-04 2021-04-08 Qualcomm Incorporated User equipment radio capability protection
PL3820178T3 (en) * 2019-11-07 2023-03-13 1Nce Gmbh Device and method for connecting a user device with a network via a telecommunication hub
PT3820184T (en) * 2019-11-07 2022-08-10 1Nce Gmbh Telecommunication hub
EP3820179B1 (en) * 2019-11-07 2022-11-02 1NCE GmbH Device and method for connecting a user device with a network via a telecommunication hub
ES2936239T3 (en) * 2019-11-07 2023-03-15 1Nce Gmbh Device and method for connecting a user device to a network through a telecommunication node
US11847205B1 (en) 2020-10-26 2023-12-19 T-Mobile Innovations Llc Trusted 5G network function virtualization of virtual network function elements embedded on a system-on-chip

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170223530A1 (en) * 2016-02-02 2017-08-03 Sprint Communications Company L.P. Hardware-trusted network bearers in network function virtualization infrastructure (nfvi) servers that execute virtual network functions (vnfs) under management and orchestration (mano) control

Family Cites Families (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008042414A2 (en) 2006-10-03 2008-04-10 Interdigital Technology Corporation Enhanced node b configuration with a universal integrated circuit card
EP2201743A4 (en) 2007-10-17 2016-01-27 Ericsson Telefon Ab L M Method and arragement for deciding a security setting
US8881257B2 (en) 2010-01-22 2014-11-04 Interdigital Patent Holdings, Inc. Method and apparatus for trusted federated identity management and data access authorization
CN102763372B (en) * 2010-02-12 2015-01-21 华为技术有限公司 Method, device and system for selecting gateway when switching in heterogeneous network
WO2011116528A1 (en) 2010-03-26 2011-09-29 Nokia Corporation Method and apparatus for providing a trust level to access a resource
US9215588B2 (en) 2010-04-30 2015-12-15 Cisco Technology, Inc. System and method for providing selective bearer security in a network environment
WO2013063285A1 (en) 2011-10-25 2013-05-02 Raytheon Company Appliqué providing a secure deployment environment (sde) for a wireless communications device
CN103313317B (en) * 2012-03-07 2016-09-28 华为技术有限公司 A kind of method of WiFi terminal accessing group data PS business domains and trusted gateway
US9106631B2 (en) 2012-03-28 2015-08-11 Honeywell International Inc. Smart meter trust center switch
USRE49491E1 (en) 2012-06-08 2023-04-11 Samsung Electronics Co., Ltd. Method and system for selective protection of data exchanged between user equipment and network
US9282898B2 (en) 2012-06-25 2016-03-15 Sprint Communications Company L.P. End-to-end trusted communications infrastructure
US8649770B1 (en) 2012-07-02 2014-02-11 Sprint Communications Company, L.P. Extended trusted security zone radio modem
US8918638B2 (en) 2012-07-03 2014-12-23 Facebook, Inc. Mobile-device-based trust computing
US8667607B2 (en) 2012-07-24 2014-03-04 Sprint Communications Company L.P. Trusted security zone access to peripheral devices
US8752140B1 (en) 2012-09-11 2014-06-10 Sprint Communications Company L.P. System and methods for trusted internet domain networking
US9113431B2 (en) 2012-11-16 2015-08-18 Qualcomm Incorporated Method for corroboration and transferring trust between network databases for enhanced positioning accuracy
EP2936754B1 (en) 2013-01-11 2020-12-02 Huawei Technologies Co., Ltd. Network function virtualization for a network device
US9161227B1 (en) 2013-02-07 2015-10-13 Sprint Communications Company L.P. Trusted signaling in long term evolution (LTE) 4G wireless communication
EP2957080B1 (en) 2013-02-12 2020-06-10 Hewlett-Packard Enterprise Development LP Network control using software defined flow mapping and virtualized network functions

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170223530A1 (en) * 2016-02-02 2017-08-03 Sprint Communications Company L.P. Hardware-trusted network bearers in network function virtualization infrastructure (nfvi) servers that execute virtual network functions (vnfs) under management and orchestration (mano) control

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ANONYMOUS: "LTE Attach and Default Bearer Setup Messaging", 25 August 2012 (2012-08-25), pages 1 - 14, XP055648060, Retrieved from the Internet <URL:https://www.eventhelix.com/lte/attach/LTE-Attach-Messaging.pdf> [retrieved on 20191202] *

Also Published As

Publication number Publication date
WO2016130447A1 (en) 2016-08-18
CA2976033C (en) 2019-07-23
CA2976033A1 (en) 2016-08-18
EP3257294A1 (en) 2017-12-20
US20160234725A1 (en) 2016-08-11
US9191865B1 (en) 2015-11-17
US9578556B2 (en) 2017-02-21

Similar Documents

Publication Publication Date Title
EP3257294B1 (en) Long term evolution (lte) communications over trusted hardware
EP3834384B1 (en) Control plane based configuration for time sensitive networking
EP3496465B1 (en) User plane function selection for isolated network slice
US11729854B2 (en) Network assisted connection
EP3468236B1 (en) Policy control for ethernet packet data
JP6055039B2 (en) System and method for sharing a common PDP context
CN114503776A (en) Supporting group communications using shared downlink data
EP4008128A1 (en) Configuration of time sensitive bridge during handover
US20210306848A1 (en) Integrity protection handling at the gnb-cu-up
EP3214805B1 (en) Method and device for transmitting control signalling
CN109314889A (en) A kind of method, apparatus and system for establishing user plane bearer
US20170303139A1 (en) Methods and systems for providing standalone LTE based communication networks
US20240040427A1 (en) Systems and methods for configuring communication with an iab mec
WO2016173296A1 (en) Access method and system for mobile network classification architecture
WO2012129997A1 (en) Method and device for processing local access connection
KR20130083506A (en) Apparatus and method for processing overlapped paging signal on epc network

Legal Events

Date Code Title Description
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE

PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20170724

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

DAV Request for validation of the european patent (deleted)
DAX Request for extension of the european patent (deleted)
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

17Q First examination report despatched

Effective date: 20191206

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: GRANT OF PATENT IS INTENDED

INTG Intention to grant announced

Effective date: 20200415

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE PATENT HAS BEEN GRANTED

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 1287351

Country of ref document: AT

Kind code of ref document: T

Effective date: 20200715

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 602016039061

Country of ref document: DE

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG4D

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20201001

REG Reference to a national code

Ref country code: NL

Ref legal event code: MP

Effective date: 20200701

REG Reference to a national code

Ref country code: AT

Ref legal event code: MK05

Ref document number: 1287351

Country of ref document: AT

Kind code of ref document: T

Effective date: 20200701

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: AT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200701

Ref country code: NO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20201001

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200701

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200701

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20201102

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20201002

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200701

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200701

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200701

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200701

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20201101

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200701

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200701

Ref country code: RS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200701

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: NL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200701

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 602016039061

Country of ref document: DE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200701

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200701

Ref country code: SM

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200701

Ref country code: IT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200701

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200701

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: AL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200701

26N No opposition filed

Effective date: 20210406

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200701

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200701

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200701

REG Reference to a national code

Ref country code: BE

Ref legal event code: MM

Effective date: 20210228

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20210208

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20210228

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20210228

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20210208

Ref country code: FR

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20210228

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20210228

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20230121

Year of fee payment: 8

Ref country code: DE

Payment date: 20230119

Year of fee payment: 8

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200701

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO

Effective date: 20160208

REG Reference to a national code

Ref country code: DE

Ref legal event code: R081

Ref document number: 602016039061

Country of ref document: DE

Owner name: T-MOBILE INNOVATIONS LLC (N.D.GES.D. STAATES D, US

Free format text: FORMER OWNER: SPRINT COMMUNICATIONS COMPANY L.P., OVERLAND PARK, KAN., US

REG Reference to a national code

Ref country code: GB

Ref legal event code: 732E

Free format text: REGISTERED BETWEEN 20240125 AND 20240131